US9660994B2 - SCADA intrusion detection systems - Google Patents
SCADA intrusion detection systems Download PDFInfo
- Publication number
- US9660994B2 US9660994B2 US14/501,672 US201414501672A US9660994B2 US 9660994 B2 US9660994 B2 US 9660994B2 US 201414501672 A US201414501672 A US 201414501672A US 9660994 B2 US9660994 B2 US 9660994B2
- Authority
- US
- United States
- Prior art keywords
- scada
- communication
- information
- industrial control
- configuration information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active, expires
Links
- 238000001514 detection method Methods 0.000 title claims abstract description 25
- 238000004891 communication Methods 0.000 claims abstract description 179
- 230000005540 biological transmission Effects 0.000 claims abstract description 15
- 230000008859 change Effects 0.000 claims description 56
- 238000000034 method Methods 0.000 claims description 37
- 230000009471 action Effects 0.000 claims description 24
- 230000004044 response Effects 0.000 claims description 24
- 238000012544 monitoring process Methods 0.000 claims description 5
- 230000001172 regenerating effect Effects 0.000 claims description 5
- 230000000694 effects Effects 0.000 description 17
- 230000008569 process Effects 0.000 description 14
- 238000010586 diagram Methods 0.000 description 10
- 230000007246 mechanism Effects 0.000 description 6
- 230000004075 alteration Effects 0.000 description 5
- 239000012530 fluid Substances 0.000 description 5
- 230000006872 improvement Effects 0.000 description 4
- 238000012986 modification Methods 0.000 description 4
- 230000004048 modification Effects 0.000 description 4
- 230000002159 abnormal effect Effects 0.000 description 3
- 238000012545 processing Methods 0.000 description 3
- 238000010276 construction Methods 0.000 description 2
- 238000003491 array Methods 0.000 description 1
- 239000003990 capacitor Substances 0.000 description 1
- 239000012141 concentrate Substances 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 239000000835 fiber Substances 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 238000007689 inspection Methods 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
- 238000005259 measurement Methods 0.000 description 1
- 230000008439 repair process Effects 0.000 description 1
- 238000005096 rolling process Methods 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
- 238000010200 validation analysis Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/102—Entity profiles
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1466—Active attacks involving interception, injection, modification, spoofing of data unit addresses, e.g. hijacking, packet injection or TCP sequence number attacks
-
- G—PHYSICS
- G05—CONTROLLING; REGULATING
- G05B—CONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
- G05B19/00—Programme-control systems
- G05B19/02—Programme-control systems electric
- G05B19/04—Programme control other than numerical control, i.e. in sequence controllers or logic controllers
- G05B19/042—Programme control other than numerical control, i.e. in sequence controllers or logic controllers using digital processors
- G05B19/0428—Safety, monitoring
-
- G—PHYSICS
- G05—CONTROLLING; REGULATING
- G05B—CONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
- G05B19/00—Programme-control systems
- G05B19/02—Programme-control systems electric
- G05B19/418—Total factory control, i.e. centrally controlling a plurality of machines, e.g. direct or distributed numerical control [DNC], flexible manufacturing systems [FMS], integrated manufacturing systems [IMS] or computer integrated manufacturing [CIM]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0876—Aspects of the degree of configuration automation
- H04L41/0883—Semiautomatic configuration, e.g. proposals from system
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/08—Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
- H04L43/0805—Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability
- H04L43/0817—Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability by checking functioning
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/101—Access control lists [ACL]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02P—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
- Y02P90/00—Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
- Y02P90/02—Total factory control, e.g. smart factories, flexible manufacturing systems [FMS] or integrated manufacturing systems [IMS]
Definitions
- the present disclosure relates generally to the field of supervisory control and data acquisition (SCADA) systems and, more particularly, to SCADA systems, in which an intrusion detection system (IDS) is used to detect authorized activity.
- SCADA supervisory control and data acquisition
- IDS intrusion detection system
- a SCADA system refers to any hardware or software application that has the ability to control local and remote devices.
- a SCADA system typically includes or communicates with an Industrial Control System (ICS) network.
- the ICS network is typically isolated from corporate networks and the internet and is responsible for connecting field devices to SCADA servers.
- ICS Industrial Control System
- a common attack on SCADA systems involves sending unsolicited data to the SCADA system that is contrary to a physical state of the normal activities of the SCADA system. For instance, reporting to a SCADA system that a fluid level was low, while the fluid level was actually very high, could result in a pump running and overflowing a container. While this does not involve alteration any code of the SCADA system, the end result could be just as severe.
- IDS is a device or software application that monitors a computing environment (e.g. network or system) for traffic that is unauthorized.
- IDSs conventionally include an internal storage of the environment's configuration to differentiate between authorized and unauthorized traffic. This internal storage may include a whitelist of applications, devices, or addresses that are authorized by the IDS for execution or to be accessed.
- an IDS detects abnormal traffic, the IDS notifies other systems and users of a potential breach so that appropriate actions may be taken.
- IDSs are conventionally deployed on ICS networks to protect SCADA systems, networks, and connected devices.
- Traditional IDS designs generally use a dedicated appliance or a separate server to keep ICS configuration information up-to-date.
- a challenge with traditional IDS implementations is that the configuration of the IDS is complex, and it is challenging to keep current (e.g. when a device connected to the SCADA system or equipment of the SCADA system is changed, etc.).
- Aspects and examples of embodiments disclosed herein present apparatus and processes that present a SCADA system with an intrusion detection component to allow the automatic creation of a whitelist so the configuration of the intrusion detection component can stay up to date without a need for manually changing the configuration every time a change in the devices occurs.
- aspects and examples disclosed herein ease the administrative burden associated with manually updating an intrusion detection component when a change in a network is made, saves time, and provides for a more secure network that can stay up to date with intrusion attempts more quickly than previously done.
- a SCADA system includes a network interface configured to communicate data with a plurality of industrial control devices via an industrial control system (ICS) network.
- the SCADA system further includes a memory storing SCADA configuration information including ICS network configuration information and device information descriptive of each industrial control device of the plurality of industrial control devices and at least one processor in data communication with the memory and the network interface.
- ICS industrial control system
- the SCADA system also includes an intrusion detection component executable by the at least one processor and configured to read the SCADA configuration information, generate, from the SCADA configuration information, authorized communication information descriptive of one or more expected communication types of communications authorized for transmission via the ICS network, each expected communication type of the one or more expected communication types being based on SCADA configuration information descriptive of an industrial control device of the plurality of industrial control devices, identify, with reference to the authorized communication information, an unauthorized communication transmitted via the ICS network, the unauthorized communication having an unauthorized communication type different from any communication type of the one or more expected communication types, the unauthorized communication type being based on new device information descriptive of a device, and execute at least one action to address the at least one communication.
- an intrusion detection component executable by the at least one processor and configured to read the SCADA configuration information, generate, from the SCADA configuration information, authorized communication information descriptive of one or more expected communication types of communications authorized for transmission via the ICS network, each expected communication type of the one or more expected communication types being based on SCADA configuration information descriptive of an industrial control device
- the new device information includes at least one of a new port number, a new address, a new protocol, and a new state.
- each expected communication type of the one or more communication types is based on the ICS network configuration information and the device information.
- the intrusion detection component is further configured to detect at least one change in the SCADA configuration information and regenerate, responsive to detection of the at least one change, the authorized communication information from the SCADA configuration information including the at least one change.
- the intrusion detection component is configured to regenerate the authorized communication information by modifying only a portion of the authorized communication information associated with the at least one change in the SCADA configuration information.
- the intrusion detection component is configured to detect the at least one change at least in part by receiving a message from a SCADA configuration component including an indication of the at least one change.
- the at least one action includes at least one of transmitting a notification to a user interface, preventing further transmission of the unauthorized communication, and restricting subsequent communications involving the device.
- the notification includes a request for the user interface to respond with response data indicating allowance or denial of the unauthorized communication.
- the response data indicates allowance of the unauthorized communication and the intrusion detection component is further configured to transmit, in response to the allowance, a configuration request to a SCADA configuration component included within the SCADA system, the configuration request including information identifying the device and instructing the SCADA configuration component to configure the SCADA configuration information to include the new device information, and regenerate, from the SCADA configuration information including the new device information, the authorized communication information to include the unauthorized communication type within the one or more expected communication types.
- the response data indicates denial of the unauthorized communication and the intrusion detection component is further configured to execute, in response to the denial, at least one action to prevent further transmission of the unauthorized communication and restrict subsequent communications involving the device.
- a computer-implemented method of managing an intrusion detection system (IDS) included within a supervisory control and data acquisition (SCADA) system in data communication with a plurality of industrial control devices via an industrial control system (ICS) network comprises reading, from a memory, SCADA configuration information including ICS network configuration information and device information descriptive of each industrial control device of the plurality of industrial control devices, generating, from the SCADA configuration information, authorized communication information descriptive of one or more expected communication types of communications authorized for transmission via the ICS network, each expected communication type of the one or more expected communication types being based on SCADA configuration information descriptive of an industrial control device of the plurality of industrial control devices, monitoring the ICS network for communications, identifying, with reference to the authorized communication information, an unauthorized communication transmitted via the industrial control network, the unauthorized communication having an unauthorized communication type different from any communication type of the one or more expected communication types, the unauthorized communication type being based on new device information descriptive of a device, and executing at least one action to address the at least one communication.
- IDS intrusion detection system
- identifying the unauthorized communication includes identifying an unauthorized communication having an unauthorized communication type based on at least one of a new port number, a new address, a new protocol, and a new state.
- the method further includes acts of detecting at least one change in the SCADA configuration information and regenerating, responsive to the at least one change, the authorized communication information from the SCADA configuration information including the at least one change.
- executing the at least one action includes executing at least one of transmitting a notification to a user interface, preventing further transmission of the unauthorized communication, and restricting subsequent communications involving the device.
- transmitting the notification includes transmitting a notification including a request for the user interface to respond with response data indicating allowance or denial of the unauthorized communication.
- the response data indicates allowance of the unauthorized communication.
- the method further includes transmitting, in response to the allowance, a configuration request to a SCADA configuration component included within the SCADA system, the configuration request including information identifying the device and instructing the SCADA configuration component to configure the SCADA configuration information to include the new device information and regenerating, from the SCADA configuration information including the new device information, the authorized communication information to include the unauthorized communication type within the one or more expected communication types.
- the response data indicates denial of the unauthorized communication and the method further comprises executing, in response to the denial, at least one action to prevent further transmission of the unauthorized communication and restrict subsequent communications involving the device.
- a non-transitory computer readable medium with sequences of instruction for managing an intrusion detection system (IDS) included within a supervisory control and data acquisition (SCADA) system in data communication with a plurality of industrial control devices via an industrial control system (ICS) network stored on it is provided.
- IDS intrusion detection system
- SCADA supervisory control and data acquisition
- ICS industrial control system
- the sequences of instructions include executable instructions that instruct the at least one processor to read, from a memory, SCADA configuration information including ICS network configuration information and device information descriptive of each industrial control device of the plurality of industrial control devices, generate, from the SCADA configuration information, authorized communication information descriptive of one or more expected communication types of communications authorized for transmission via the ICS network, each expected communication type of the one or more expected communication types being based on SCADA configuration information descriptive of an industrial control device of the plurality of industrial control devices, monitor the ICS network for communications, identify, with reference to the authorized communication information, an unauthorized communication transmitted via the ICS network, the unauthorized communication having an unauthorized communication type different from any communication type of the one or more expected communication types, the unauthorized communication type being based on new device information descriptive of a device, and execute at least one action to address the at least one communication.
- the new device information includes at least one of a new port number, a new address, a new protocol, and a new state.
- the computer-readable medium further includes instructions that instruct the at least one processor to detect at least one change in the SCADA configuration information and regenerate, responsive to the at least one change, the authorized communication information from the SCADA configuration information including the at least one change.
- FIG. 1 is a block diagram of one example of an ICS network
- FIG. 2 is a block diagram of one example of a SCADA system
- FIG. 3 is a block diagram of one example of a device included within an ICS network
- FIG. 4 is a block diagram of one example of an IDS
- FIG. 5 is a block diagram of one example of a computer system
- FIG. 6 is a flow diagram of one example of SCADA whitelisting process.
- FIG. 7 is a flow diagram of one example of a process for updating a whitelist.
- Embodiment disclosed herein manifest the realization that methods and systems are needed to address some of the shortcomings of conventional SCADA systems with regard to keeping an IDS up-to-date when a change in connected devices included in an ICS network occurs.
- references to “or” may be construed as inclusive so that any terms described using “or” may indicate any of a single, more than one, and all of the described terms.
- the term usage in the incorporated references is supplementary to that of this document; for irreconcilable inconsistencies, the term usage in this document controls.
- Various embodiments use information stored in the SCADA system that describes the state of devices included in the SCADA system to help mitigate IDS configuration challenges. Some of these embodiments also reduce the footprint of the IDS.
- the IDS is a native component of the SCADA system, thereby removing the need for additional hardware dedicated to the IDS.
- authorized communication information e.g., a whitelist
- the whitelist may include all information necessary to define every authorized device in the ICS network, including interface points (e.g., the registers) each device uses and all of the permissions each device is given.
- the whitelist may only be manually accessed or edited by a user with a special role or permission given to the user by a “super” or “root” user that allows the user to access or edit the whitelist.
- This stored information may also be used to validate a change in the devices and adjust the whitelist. For example, when a device such as a breaker or power meter is removed from service for maintenance or repair and then replaced, the integrated SCADA IDS detects a device removal as the integrated SCADA IDS is aware of the state of the device and the device's communication settings. Once removed from the network, within seconds, the SCADA system reports a communication failure of the device.
- the SCADA IDS detects that the configuration of the device does not match recorded information (as the similar device is not the original device) and triggers an appropriate alarm.
- An alarm may be, for example, a misconfiguration alarm that may be raised if a device is configured in a manner inconsistent with the whitelist.
- the ICS network may be validated and stored in the SCADA system device data once the configuration for all devices is complete. Once validated, any change in the configuration of a device can trigger a validation requirement alarm to indicate that the ICS network needs to be re-validated. Further, if the IDS detects an unauthorized device due to the device having a configuration that is inconsistent with the whitelist, an unexpected device alarm may be raised.
- the whitelist includes information descriptive of all of the devices in the ICS network along with a number of identifiers of the devices, making it extremely difficult for an unauthorized component to emulate a device exactly. Further, since the SCADA system stores information descriptive of all the connected devices, the IDS can automatically reconfigure itself to adjust for the changed device. The IDS can then automatically merge those changes into the existing IDS configuration and continue monitoring.
- FIG. 1 illustrates different components within an example ICS network 100 including a SCADA system 102 constructed to receive configuration and state information from a plurality of devices 104 through a network 106 .
- the state information may include whether a device is in an “active” state, a standby state, a “spare” state, an “unauthorized state” (indicating that the device may be a rogue device and should not be allowed access to the ICS network), and an “off” state.
- FIG. 1 also depicts a user 108 who interacts with the SCADA system 102 .
- the network 106 may include a complex of ICS networks comprised of standard Ethernet compatible components and common twisted-pair Cat-5 cabling or fiber.
- the network 106 may be an ICS network that is dedicated to the SCADA system 102 and isolated from corporate networks and the internet.
- the network 106 is responsible for connecting field devices 104 (e.g. power meters, breakers, etc.) to the SCADA system 102 .
- the network 106 is comprised of serial links or any other type of wired or wireless connections, including a combination of different types of connections.
- the network 106 may be an ICS network that is connected to the internet by means of an ICS-specific firewall.
- the IDS may concentrate on the internal portion of the network, allowing communication ingress and egress to proceed to the internet via the ICS-specific firewall.
- the SCADA system 102 is isolated except through that firewall.
- the SCADA System 102 may use a Unidirectional Gateway, also known as a data-diode, to allow the ICS network to provide data to the internet but allow no connections back in.
- FIG. 2 illustrates an example SCADA system 102 configured to monitor and control activities executed by the devices 104 via the network 106 .
- the SCADA system 102 includes an IDS 202 , a storage 204 , a network interface 206 , a user interface 208 , a memory 210 , a sensor interface 212 , a device manager 214 , and a processor 218 .
- the processor 218 is coupled to and in data communication with the IDS 202 , the storage 204 , the network interface 206 , the user interface 208 , the memory 210 , the sensor interface 212 , and the device manager 214 .
- the processor 218 may gather data and send commands to all of the parts of the SCADA system.
- the memory 210 is configured to store configuration data 220 descriptive the ICS network 100 .
- the configuration data 220 describes the overall configuration of the ICS network 100 .
- the configuration data 220 is referenced by one or more components of the ICS network to enable interoperation of the devices 104 in execution of the operational objectives of the ICS network 100 .
- the device manager 214 references the configuration data 220 to monitor and control of the individual devices 104 that comprise the ICS network 100 . As such, the configuration data 220 must change when any of the devices 104 is removed or replaced.
- the storage 204 is configured to store the device data 216 .
- This device data 216 may include information regarding each device included in the ICS network 100 .
- the device data 216 is descriptive of the devices 104 that exchange information via the network 106 .
- the device data 216 may include configuration information about each of the devices, such as device name, port number, IP address, MAC address, device ID, commands supported, read registers requested, write commands supported, write registers, protocols, states, and any other identifying characteristics.
- the device data 216 further includes instructions (e.g. ladder logic) used to configure the devices 104 to execute operations. As described further below, this configuration information may be used by other system components, such as the IDS 102 , to identify (e.g., uniquely identify or identify as a member of a group) each individual device connected to the network 106 .
- the sensor interface 212 is configured to process telemetry data from sensors embedded within the devices 104 during operation of the ICS network 100 .
- the sensor interface 212 stores internal representations of this operational information in the storage 204 .
- the sensor interface 212 alternatively or additionally transmits the operational information to the user interface 208 or the device manager 214 .
- the sensor interface 212 also transmits commands to the devices 104 . As is described further below, these commands may be communicated to sensors embedded within the device 104 .
- the user interface 208 is configured to receive input from the user 108 and provide output to the user 108 that is descriptive of the devices 104 or the SCADA system 102 . In some embodiments, when executing according to this configuration, the user interface 208 retrieves and stores internal representations of input and output regarding the device 104 within the device data 216 . In other embodiments, the user interface 208 retrieves and stores internal representations of input and output regarding the SCADA system 102 within the device data 216 .
- the user interface 208 may be constructed from a variety of hardware and software components. For instance, in one example, the user interface 208 includes a hardware button or switch that allows the user to manually switch devices. In other examples, the user interface 208 includes a web application implemented on a mobile device. Thus, according to the embodiments disclosed herein, the user interface 208 is not limited to a particular set of hardware or software components.
- the device manager 214 is configured to identify and configure the devices 104 using the device data 216 .
- the device manager 214 when executing according to this configuration, the device manager 214 discovers new devices connected to the network 106 and stores data elements within the device data 216 descriptive of the new devices.
- the device manager 214 exchanges messages with the devices 104 to update the devices 104 in response to receiving input from the user 108 via the user interface 208 .
- the device manager 214 may transmit these configuration messages in response to input indicating selection of an immediate notification option presented by the user interface 208 .
- the device manager 214 may transmit the configuration message at different, future points in time.
- the user 108 may connect to the device manager 214 through the user interface 208 to switch a device to which the SCADA system 102 is connected, change the device's state to an active state, and optionally change another device's state to “spare” or “standby.”
- a device in a spare state may be a device used as a manual replacement for a device that has failed or exhibits indications of imminent failure.
- a device in a standby state may be controlling or monitoring the same load or circuit as a device in active mode, and can automatically replace the standby device if failure occurs.
- the network interface 206 is configured to communicate with a plurality of remote devices and cloud computing sources. For example, when executing according to this configuration in some embodiments, the network interface 206 allows the SCADA system to connect with cloud computing sources to implement complex control algorithms that are practically infeasible to implement on a traditional programmable logic controller (e.g. a complex PID control algorithm).
- the network interface 206 may use a variety of protocols such as transport layer security or secure sockets layer to communicate with remote devices.
- the IDS 202 configured to monitor traffic on the network 106 and identifying any unauthorized activity (e.g., traffic, devices, etc.).
- the IDS 202 compares activity on the network 106 to a whitelist (e.g., the whitelist 404 , which is described further below with reference to FIG. 4 ) to determine whether the activity is authorized.
- the IDS 202 may generate this whitelist using the device data 216 .
- the IDS 202 may communicate with the storage 204 using standard security protocols. These standard security protocols may include packet-based and transport-based security protocols.
- Packet-based security protocols may encrypt a message before passing the message across a secure or insecure channel.
- Transport-based security mechanisms may encrypt either encrypted or unencrypted traffic inside of a “tunnel.”
- the “tunnel” is a transport for data that implements encryption or other security.
- Transport-based security protocols include SSL and TLS.
- the IDS 202 may comprise a dedicated processor and memory. In other embodiments, the IDS 202 may be implemented by the SCADA system's processor 218 .
- the IDS 202 is configured to respond to unauthorized activity by executing one or more configurable actions. These actions may include transmitting a notification (e.g., an alarm) descriptive of the unauthorized activity to the user interface 208 . These actions may also include transmitting a request to the device manager 214 to shut down devices that pose a potential security risk. In other embodiments, the configurable actions may include reducing permissions for an unauthorized device to prevent access to important areas of the SCADA system until a user can confirm whether or not the unauthorized device should be authorized.
- a notification e.g., an alarm
- the configurable actions may include reducing permissions for an unauthorized device to prevent access to important areas of the SCADA system until a user can confirm whether or not the unauthorized device should be authorized.
- data may be stored in any logical construction capable of storing information on a computer readable medium including, among other structures, flat files, indexed files, search engine indexes, hierarchical databases, relational databases or object oriented databases. These data structures may be specifically configured to conserve storage space or increase data exchange performance.
- various examples organize the data into particularized and, in some cases, unique structures to perform the functions disclosed herein.
- the data structures are sized and arranged to store values for particular types of data, such as integers, floating point numbers, character strings, arrays, linked lists, and the like.
- Information may flow between the components illustrated in FIG. 2 , or any of the elements, components and subsystems disclosed herein, using a variety of techniques.
- Such techniques include, for example, passing the information over a network using standard protocols, such as TCP/IP, HTTP, or HTTPS, passing the information between modules in memory and passing the information by writing to a file, database, data store, or some other nonvolatile data storage device, among others.
- pointers or other references to information may be transmitted and received in place of, in combination with, or in addition to, copies of the information.
- the information may be exchanged in place of, in combination with, or in addition to, pointers or other references to the information.
- Other techniques and protocols for communicating information may be used without departing from the scope of the examples and embodiments disclosed herein.
- FIG. 3 illustrates a block diagram of a device 104 .
- the device 104 may include an industrial control device, such as an intelligent electronic device (IED) or a programmable device.
- the device 104 may be a programmable logic controller (PLC), power monitor such as a power meter, a transformer, a tie, a capacitor bank, a protection relay device such as a circuit breaker, a remote terminal unit (RTU), a transfer switch, a fault passage indicator, or any other type of industrial control device.
- the device 104 includes a processor 302 , a memory 304 , a network interface 306 , and a sensor 310 .
- the memory 304 stores configuration data 308 .
- the configuration data 308 includes information descriptive of a port number 312 , an IP address 314 , and protocols 316 supported by the device 104 .
- the configuration data 308 also includes information descriptive of all of the specific registers, commands, messages, or other communications that can be processed by the device.
- the processor 302 is configured to execute device operations and to exchange a variety of information with the sensor interface 212 and the device manager 214 via the network interface 306 .
- the network interface 306 is coupled to and in data communication with a network, such as the network 106 described above with reference to FIG. 1 .
- the processor 302 is configured to exchange telemetry information with the sensor interface 212 , and configuration information, such as the configuration information 308 , with the device manager 214 .
- the configuration information 308 may include the port number 312 , the IP address 314 , protocols 316 , and other information such as the state of the device.
- the senor 310 includes one or more analog sensors, analog inputs, and digital outputs.
- the sensor 310 includes an analog to digital converter that converts analog sensor signals to digital telemetry data.
- the sensor 310 may provide this telemetry data to the processor 302 .
- the sensor 310 also includes digital inputs through which the processor 302 transmits digital commands received from the sensor interface 212 .
- FIG. 4 illustrates an example of a block diagram of an IDS 202 within a SCADA system 102 .
- the IDS 202 is configured to monitor traffic to determine whether a device or a device's activity may be unauthorized and, therefore, potentially harmful.
- the IDS 202 includes a monitor 402 , a whitelist 404 , configuration data 406 , and a configuration manager 410 .
- the monitor 402 is configured to analyze traffic within the ICS network 100 .
- the monitor 402 may compare the state, port number, IP address, and protocols of a device (e.g., one of the devices 104 described above with reference to FIG. 1 ) to the state, port number, IP address, and protocols of entries in the whitelist 404 for the device. For example, if a source device transmits an information packet and in the whitelist the device is noted to be active, the IDS 202 may provide the incoming traffic to the monitor 402 .
- the monitor 402 may compare the source device's port number, IP address, and protocols as indicated by the incoming traffic to the information in the whitelist 404 for the source device.
- the monitor 402 may transmit an alarm to a user interface, such as the user interface 208 described above with reference to FIG. 2 . Further, the monitor 402 may send a message to the device manager 214 to restrict access for the source device.
- a user interface such as the user interface 208 described above with reference to FIG. 2 .
- the monitor 402 may send a message to the device manager 214 to restrict access for the source device.
- Table 1 An example of some of the information that may be provided in the whitelist 404 for a power meter is shown in Table 1.
- traffic originating from or addressed to the power meter should identify the power meter using an IP address of 192.168.2.56, a MAC address of AA:BB:CC:DD:EE:FF, and a port number of 550.
- IP address 192.168.2.56, a MAC address of AA:BB:CC:DD:EE:FF, and a port number of 550.
- only the registers of 1101-1199 and 1250 should be read and only the registers of 404 and 405 should be written to.
- the only Modbus commands that should be included in the traffic are 1, 2, and 4 and the only write commands that should be included are 5, 6, 15, and 16. This way, the IDS can compare the incoming device traffic to the whitelist, which is built, in part, from stored device data 216 .
- the IDS may authorize (e.g., where all of the information in the traffic is consistent with the whitelist) or block (e.g., where any element or elements of the information in the traffic is inconsistent with the whitelist) the device communication.
- the state may also used by the IDS.
- the SCADA system device data 216 may store a “device profile” for each device.
- the “device profile” includes all of the information that the SCADA system may need to allow the IDS to detect rogue traffic, including the device name, the device's MAC address, the device's IP address, the device's port number, the device's ID, the commands the device supports, the read registers the device may request, the write commands the device may support, the write registers the device may use, and other device information for each device in the ICS network.
- the “device profile” may also include all of the controls and writes that could be executed from the SCADA system to the device and all other information that may be read from the device.
- the whitelist 404 may be generated using device data, such as the device data 216 held in the storage 204 of the SCADA system 102 , the device data having been stored within the SCADA system 102 as a result of the SCADA system's 102 configuration.
- the whitelist 404 may include information about each of the devices such as a state (active, standby, spare, unauthorized, off), port number, IP address, protocols, and other identifying characteristics of the device.
- the SCADA system 102 intrinsically stores information about the devices 104 , so all of the information for the whitelist 404 may come directly from the device data 216 of the SCADA system 102 .
- the whitelist 404 may be used to validate traffic generated by any of the devices.
- the unauthorized device or device activity may be addressed. If the unauthorized activity was the result of an authorized change to the ICS network 100 , for example if a device was manually switched out, the user may validate the change and the whitelist 404 may be automatically updated with the updated device information by the IDS 202 . Once the whitelist 404 has been updated, the monitor 402 allows traffic generated by the new device to continue unrestricted. In some embodiments, the configuration 406 specifies actions to be executed by the monitor 402 upon detection of an unauthorized activity.
- the user may edit the configuration data 406 from the user interface 208 to, for example, automatically block traffic generated by unauthorized devices, shut down unauthorized devices, or simply trigger an alarm to the user that an unauthorized device or activity has been detected. It may be appreciated that if a device attempts to communicate with a register that it should not be able to communicate with or a register that does not exist, the whitelist, as a result of being built off of the configuration information, will be able to detect that the device should not be able to communicate with the register and can take action to prevent communications from that device.
- the configuration data 406 also specifies which characteristics of a device should be used by the monitor 402 when comparing traffic from a device with the whitelist 404 to determine whether activity or the device is authorized or unauthorized.
- device-specific whitelist entry types may be used to identify authorized or unauthorized activity.
- the whitelist entry types may differ over time for a specific device.
- the configuration data 406 may also be automatically updated whenever a change is made to the ICS network 100 .
- the IDS 202 may be notified of, or independently determine via inspection of the device data 216 , that a change has occurred in the SCADA component configuration, the device configuration, or the network layout. In this event, the user may validate this reconfiguration.
- the configuration manager 410 reads IDS configuration information from the configuration data 406 , SCADA system configuration information and ICS network configuration information from the configuration data 220 , and device configuration information from the device data 216 to compile data for the generation of the whitelist of information of the connected devices 104 .
- the configuration manager 410 automatically merges changes into the configuration data 406 and the whitelist 404 .
- the whitelist 404 may be stored in a database or any other form of logical or physical data structure within the IDS 202 .
- the whitelist 404 may be in the memory 210 of the SCADA system.
- the IDS configuration data 406 and the whitelist 404 may be too big to store in memory 210 and may be stored in a non-volatile storage device, such as the storage 204 .
- the IDS 202 may be configured to change the SCADA component configuration, the device configuration, and the ICS network layout if the IDS detects an unauthorized change in a device.
- additional security measures can be raised. These security measures include requesting a password before any control operation or issuing an alarm or notification that indicates detected, abnormal activity to a user. The change may also be to rollback to a previous state or to reconfigure the SCADA component configuration, the device configuration, and the network layout to use a different device.
- the whitelist 404 that is created from that data is also intrinsic to the SCADA system 102 . Having a central intrinsic data store including information descriptive of all of the devices 104 connected to the SCADA system 102 that are active, on standby, in spare mode, or off helps avoid the need for additional hardware or delay times in transferring the data. Previous methods of generating a whitelist may scan or learn parts of the SCADA system 102 from an external system, but using an internal storage 204 with the device data 216 makes getting information about all of the connected devices 104 simpler and more direct.
- an intrinsic whitelist enables greater accuracy regarding devices on standby, since the SCADA system 102 has stored information descriptive of the devices on standby, as opposed to external systems that create a whitelist by scanning connected devices and may miss devices that are not active at the time of scanning.
- Using an IDS or a whitelist that is not internal to the SCADA system makes it hard to discover or scan devices that are in standby or in a mode that is not active.
- Traditional IDS implementations do not have a data store descriptive of all the connected devices in an ICS network, so if a new device is added to the network, the user must manually add the new device to the SCADA configuration and, as a separate and distinct manual activity, add the new device the whitelist.
- FIG. 5 illustrates an example a block diagram of computing components forming a system 500 which may be configured to implement one or more aspects disclosed herein.
- the system 500 may be communicatively coupled to a SCADA system or included within a SCADA system and configured to perform a monitoring or whitelisting process as described above.
- the system 500 may also be used to display information regarding the SCADA system, the IDS, and the devices to a user.
- the distributed system 500 includes a computer system 514 .
- the computer system 514 may include for example a general-purpose computing platform such as those based on Intel PENTIUM-type processor, Motorola PowerPC, Sun UltraSPARC, Texas Instruments-DSP, Hewlett-Packard PA-RISC processors, or any other type of processor.
- System 500 may include specially-programmed, special-purpose hardware, for example, an application-specific integrated circuit (ASIC).
- ASIC application-specific integrated circuit
- Various aspects of the present disclosure may be implemented as specialized software executing on the system 500 such as that shown in FIG. 5 .
- the system 500 may include a processor/ASIC 506 connected to one or more memory devices 510 , such as a disk drive, memory, flash memory or other device for storing data.
- Memory 510 may be used for storing programs and data during operation of the system 500 .
- Components of the computer system 500 may be coupled by an interconnection mechanism 508 , which may include one or more buses (e.g., between components that are integrated within a same machine) or a network (e.g., between components that reside on separate machines).
- the interconnection mechanism 508 enables communications (e.g., data, instructions) to be exchanged between components of the system 500 . Further, in some embodiments the interconnection mechanism 508 may be disconnected during servicing of a PDU.
- the system 500 also includes one or more input devices 504 , which may include for example, a keyboard or a touch screen. An input device may be used for example to configure the measurement system or to provide input parameters.
- the system 500 includes one or more output devices 502 , which may include for example a display.
- the computer system 500 may contain one or more interfaces 516 that may connect the computer system 500 to a communication network, in addition or as an alternative to the interconnection mechanism 508 .
- the system 500 may include a storage system 512 , which may include a computer readable and/or writeable nonvolatile medium in which signals may be stored to provide a program to be executed by the processor or to provide information stored on or in the medium to be processed by the program.
- the medium may, for example, be a disk or flash memory and in some examples may include RAM or other non-volatile memory such as EEPROM.
- the processor 506 may cause data to be read from the nonvolatile medium into another memory 510 that allows for faster access to the information by the processor/ASIC 506 than does the medium.
- This memory 510 may be a volatile, random access memory such as a dynamic random access memory (DRAM) or static memory (SRAM).
- DRAM dynamic random access memory
- SRAM static memory
- the processor 506 may manipulate the data within the integrated circuit memory 510 and then copy the data to the storage 512 after processing is completed.
- a variety of mechanisms are known for managing data movement between storage 512 and the integrated circuit memory element 510 , and the disclosure is not limited thereto. The disclosure is not limited to a particular memory system 510 or a storage system 512 .
- the system 500 may include a general-purpose computer platform that is programmable using a high-level computer programming language.
- the distributed system 500 may be also implemented using specially programmed, special purpose hardware, e.g. an ASIC.
- the system 500 may include a processor 506 , which may be a commercially available processor such as the well-known Pentium class processor available from the INTEL CORPORATION. Many other processors are available.
- the processor 506 may execute an operating system which may be, for example, a WINDOWS operating system available from the MICROSOFT CORPORATION, MAC OS System X available from APPLE COMPUTER, the SOLARIS Operating System available from SUN MICROSYSTEMS, or UNIX and/or LINUX available from various sources. Many other operating systems may be used.
- the processor and operating system together may form a computer platform for which application programs in high-level programming languages may be written. It should be understood that the disclosure is not limited to a particular computer system platform, processor, operating system, or network. Also, it should be apparent to those skilled in the art that the present disclosure is not limited to a specific programming language or computer system. Further, it should be appreciated that other appropriate programming languages and other appropriate computer systems could also be used.
- a whitelist is automatically created to list all of the allowed devices that may communicate with an ICS network, such as the ICS network 100 described above with reference to FIG. 1 . More specifically, according to one embodiment, an IDS in a SCADA system generates a whitelist by using the SCADA system's inherent storage of all of the devices to which the SCADA system is connected.
- FIG. 6 is a flowchart that illustrates a whitelisting process 600 .
- the whitelisting process 600 may be executed to create or recreate a whitelist and to check ICS network traffic to determine if information from a specific devices in the ICS network is authorized or unauthorized.
- a whitelist such as the whitelist 404 described above with reference to FIG. 1 , is created or recreated using the device data in the SCADA system.
- the device data is taken from the SCADA system's configuration information.
- the whitelist is descriptive of a variety of communication types describing or transmitted by the connected devices, any communication protocols they support, and information about the devices such as their state, address (IP address, MAC address, etc.), and port number.
- the whitelist may be automatically edited or updated to account for a change in the system, instead of being completely rewritten every time a change is made. If a user changes a device or wants to add a device to the SCADA system, the device may be authorized, detected, and added to the whitelist by either deleting and recreating the whole whitelist or updating the whitelist. For example, a user may update the SCADA system configuration, a device configuration, the IDS configuration, or the network layout through the user interface. In some examples the change may be a result of an automatic replacement of a failing device. In these examples a device that fails may be replaced by a standby device.
- the whitelist is stored in a database.
- the whitelist may include previous edits with timestamps to show the user when a change was made.
- the whitelist may also include any information about a device that may be relevant to identifying the device.
- the database is used to store versions of the whitelist over time. It is appreciated that using a database allows for simpler reversions to previous whitelists where appropriate.
- the SCADA system receives information from a device.
- the IDS monitors all data communications in the ICS network, and may be configured to respond to different communications in different ways, depending on if the communications are authorized or not.
- the received information may be generated by normal ICS network operations and may include a request for access to a part of the system or a notice to change a parameter of the system.
- the information may be solicited or unsolicited.
- the information may also be requested by the SCADA system, and if an unauthorized device sends data back then the IDS can use the whitelist to address the unauthorized activity. Even though the SCADA system sent a request and expected a response, the IDS that monitors the ICS network can detect that the received data is not from the expected source and can address the communication appropriately.
- the IDS checks the communication information received against the whitelist of devices. If the sender device is on the whitelist, then the sender is an authorized device and the communication may be allowed to go through, as shown at act 612 . If the sender device is not on the whitelist, then the device is not authorized to communicate on the ICS network and the IDS addresses the unauthorized communication by executing the act 610 .
- the IDS addresses the unauthorized communication.
- the unauthorized device may be a device that a user manually replaced or a rogue device.
- the SCADA system triggers an alarm to alert the user via the user interface of the problem and responds with one or more actions. For example, until the user responds with whether or not the device should be authorized, communications transmitted by the device may terminated by the IDS or ignored by all devices at the instruction of the IDS.
- the actions may also include shutting down the device (if possible) and rolling back the system to a state before the device made any changes (if the device made any changes). If the user confirms that the device is unauthorized, the SCADA system rejects any and all communications with the device.
- the SCADA system authorizes the device by changing the SCADA system configuration, the IDS configuration, and by automatically regenerating, either fully or in part, the whitelist to include the previously unauthorized communication type and device information.
- the whitelisting process 600 ends at 614 .
- a source device such as any of the device 104 described above with reference to FIG. 1 transmits a message to the SCADA system that includes an indication that a fluid level is low.
- an IDS included with the SCADA system intercepts the message and analyzes it to determine whether it meets any applicable whitelist entries. If so, the IDS executes the act 612 and releases the message to the SCADA system for subsequent processing. This subsequent processing includes receiving the message and causing a pump to run to refill a container. However, if the message does not meet one or more of the whitelist entries, the message is unauthorized.
- the message may have been originated by an unauthorized device which reports a low fluid level while the fluid level is actually normal.
- the IDS executes the act 610 , detects the unauthorized message, and prevents the message from being acted upon by the SCADA system, thus avoiding an overflowing of the container.
- the IDS detects the unauthorized message by comparing the states of all of the devices and their communication settings to entries in the whitelist and determining that some of the states and setting do not match their corresponding whitelist entries.
- the whitelist may be automatically updated by the IDS whenever a change is detected, such as a change in a SCADA component configuration, a device configuration, or a network layout of the ICS network.
- FIG. 7 is a flowchart that illustrates an updating process 700 .
- the updating process 700 may be executed to detect and react to a configuration change. For example, if a user replaced a component within the ICS network or if a component failed and stopped responding, the SCADA configuration, device configuration, or the network layout may be updated. In response to this update, the IDS may modify its configuration and whitelist by executing the updating process 700 .
- a change in the configuration of at least one of the SCADA system configuration, the device configuration, and the network layout is detected.
- the change may be a result of a manual change due to a component being upgraded, replaced, or improperly configured.
- the IDS may detect the change as a result of an unexpected device sending data.
- the user is alerted of the change in the configuration.
- the alert may be through an alarm, an email to the user, a notification on a computer, a notification on a mobile device, a light turning on, a sound playing, or any other way to alert a user.
- the user is not notified about the change in the SCADA configuration, the device configuration, or the network layout.
- the IDS configuration may be set to automatically assume the change is valid or invalid and skip to step 708 or 714 respectively.
- the IDS may detect if the device at least matches a different device on the whitelist and if the device is a device that should have been on standby, the IDS may assume the expected device was replaced and continue to 714 .
- the IDS identifies the device as being unauthorized and restricts the unauthorized device's access, triggers an alarm, or shuts the device down. It is appreciated that where a previously used device has been refurbished, placed back into commission, and begins to send traffic, the device may appear as unauthorized and trigger an alarm (e.g., where the SCADA configuration has not been updated to reflect the recommissioning of the refurbished device).
- the user validates the change.
- the user may validate the change via a computer or via other hardware such as by a physical button click. If the user validates the change, then the IDS determines an updated configuration as well as an updated whitelist, as shown in 708 .
- the IDS automatically retrieves information from the SCADA device data to update its configuration and whitelist. The configuration information for the devices, the network layout, and the SCADA configuration may all be retrieved to be put into the IDS configuration. Using the updated device information from the SCADA configuration information, the IDS may create an updated whitelist.
- the IDS configuration is completely remade and replaces the old IDS configuration. In other examples the IDS configuration may be edited to make up for the changes in the SCADA system, the devices, and the network layout.
- the IDS automatically merges the updated IDS configuration into the existing IDS configuration.
- the merge may be done by the SCADA system's processor.
- the whitelist is also updated. The old whitelist may be deleted and reconstructed or the updated information may be used to update the whitelist by changing it. After the IDS configuration and whitelist have been automatically updated, the IDS continues to monitor the devices using the updated configuration and whitelist.
- act 714 the user has noted that the change is unexpected and the IDS will determine that the new device must be an unauthorized device. Therefore, no changes are made to the IDS configuration, and the IDS continues to monitor the devices, as shown in act 716 . If the device that is expected to send data is offline, the SCADA system may inform the user that the device needs to be replaced. In some examples the SCADA system may replace the device on its own if a known replacement in standby mode exists in the whitelist. In other examples the IDS may flag the potential threat and shut down or limit access to the unauthorized device.
- Processes 600 and 700 each depict one particular sequence of acts in a particular embodiment.
- the acts included in these processes may be performed by, or using, one or more computer systems specially configured as discussed herein. Some acts are optional and, as such, may be omitted in accord with one or more embodiments. Additionally, the order of acts can be altered, or other acts can be added, without departing from the scope of the embodiments described herein. Furthermore, as described above, in at least one embodiment, the acts are performed on particular, specially configured machines, namely an expense report system configured according to the examples and embodiments disclosed herein.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Automation & Control Theory (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US14/501,672 US9660994B2 (en) | 2014-09-30 | 2014-09-30 | SCADA intrusion detection systems |
EP15187752.9A EP3002648B1 (fr) | 2014-09-30 | 2015-09-30 | Systèmes de détection d'intrusion scada |
ES15187752T ES2883948T3 (es) | 2014-09-30 | 2015-09-30 | Sistemas de detección de intrusiones SCADA |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US14/501,672 US9660994B2 (en) | 2014-09-30 | 2014-09-30 | SCADA intrusion detection systems |
Publications (2)
Publication Number | Publication Date |
---|---|
US20160094578A1 US20160094578A1 (en) | 2016-03-31 |
US9660994B2 true US9660994B2 (en) | 2017-05-23 |
Family
ID=54252111
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/501,672 Active 2034-11-23 US9660994B2 (en) | 2014-09-30 | 2014-09-30 | SCADA intrusion detection systems |
Country Status (3)
Country | Link |
---|---|
US (1) | US9660994B2 (fr) |
EP (1) | EP3002648B1 (fr) |
ES (1) | ES2883948T3 (fr) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20180088541A1 (en) * | 2015-03-27 | 2018-03-29 | Bühler AG | Adaptive cross plant control and steering system, and corresponding method thereof |
US10630701B2 (en) | 2017-11-29 | 2020-04-21 | Institute For Information Industry | System and method for identifying application layer behavior |
US20200389499A1 (en) * | 2019-06-07 | 2020-12-10 | Electro Industries/Gauge Tech | Enterprise security in meters |
US11734704B2 (en) | 2018-02-17 | 2023-08-22 | Ei Electronics Llc | Devices, systems and methods for the collection of meter data in a common, globally accessible, group of servers, to provide simpler configuration, collection, viewing, and analysis of the meter data |
US11734396B2 (en) | 2014-06-17 | 2023-08-22 | El Electronics Llc | Security through layers in an intelligent electronic device |
US11754997B2 (en) | 2018-02-17 | 2023-09-12 | Ei Electronics Llc | Devices, systems and methods for predicting future consumption values of load(s) in power distribution systems |
US11816465B2 (en) | 2013-03-15 | 2023-11-14 | Ei Electronics Llc | Devices, systems and methods for tracking and upgrading firmware in intelligent electronic devices |
US12099468B2 (en) | 2011-10-04 | 2024-09-24 | Ei Electronics Llc | Systems and methods for collecting, analyzing, billing, and reporting data from intelligent electronic devices |
Families Citing this family (35)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2525248B (en) * | 2014-04-17 | 2016-06-08 | Invasec Ltd | A computer security system and method |
US20160105320A1 (en) * | 2014-10-14 | 2016-04-14 | Cisco Technology, Inc. | Automated network configuration in a closed network topology |
US10341342B2 (en) * | 2015-02-05 | 2019-07-02 | Carrier Corporation | Configuration data based fingerprinting for access to a resource |
US10469447B2 (en) * | 2015-03-16 | 2019-11-05 | Schweitzer Engineering Laboratories, Inc. | Network access gateway |
US10250619B1 (en) | 2015-06-17 | 2019-04-02 | Mission Secure, Inc. | Overlay cyber security networked system and method |
US10205733B1 (en) * | 2015-06-17 | 2019-02-12 | Mission Secure, Inc. | Cyber signal isolator |
JP6693114B2 (ja) * | 2015-12-15 | 2020-05-13 | 横河電機株式会社 | 制御装置及び統合生産システム |
JP6759572B2 (ja) | 2015-12-15 | 2020-09-23 | 横河電機株式会社 | 統合生産システム |
US10148686B2 (en) * | 2016-02-10 | 2018-12-04 | Accenture Global Solutions Limited | Telemetry analysis system for physical process anomaly detection |
US11373245B1 (en) * | 2016-03-04 | 2022-06-28 | Allstate Insurance Company | Systems and methods for detecting digital security breaches of connected assets based on location tracking and asset profiling |
CN109074453B (zh) * | 2016-04-26 | 2021-10-26 | 三菱电机株式会社 | 入侵检测装置、入侵检测方法以及计算机能读取的存储介质 |
EP3258661B1 (fr) | 2016-06-16 | 2020-11-18 | ABB Schweiz AG | Détection de changements de configuration anormale |
CN106100955B (zh) * | 2016-06-23 | 2020-01-17 | 北京东土科技股份有限公司 | 工业互联网现场层宽带总线数据深度检测实现方法 |
KR101972295B1 (ko) * | 2016-06-23 | 2019-04-24 | 미쓰비시덴키 가부시키가이샤 | 침입 검지 장치 및 기억 매체에 저장된 침입 검지 프로그램 |
US10642988B2 (en) * | 2016-08-04 | 2020-05-05 | Honeywell International Inc. | Removable media protected data transfer in a cyber-protected system |
EP3343968B1 (fr) * | 2016-12-30 | 2021-08-11 | u-blox AG | Appareil de surveillance, système de surveillance de dispositifs et procédé de surveillance d'une pluralité de dispositifs en réseau |
WO2018134939A1 (fr) * | 2017-01-19 | 2018-07-26 | 三菱電機株式会社 | Dispositif de détection d'attaque, procédé de détection d'attaque et programme de détection d'attaque |
WO2018077483A1 (fr) * | 2017-01-23 | 2018-05-03 | Mitsubishi Electric Corporation | Évaluation et génération d'une liste blanche |
WO2018160530A1 (fr) | 2017-02-28 | 2018-09-07 | Leviton Manufacturing Co., Inc. | Disjoncteurs activés par communication |
US10931636B2 (en) * | 2017-03-23 | 2021-02-23 | Pismo Labs Technology Limited | Method and system for restricting transmission of data traffic for devices with networking capabilities |
US20190098021A1 (en) * | 2017-09-22 | 2019-03-28 | Microsoft Technology Licensing, Llc | Enhanced systems for identifying and monitoring expected communication patterns of computing devices |
CN108108210A (zh) * | 2018-01-11 | 2018-06-01 | 上海有云信息技术有限公司 | 安全产品的管理方法、装置、服务器及存储介质 |
WO2019140280A1 (fr) * | 2018-01-12 | 2019-07-18 | Brian Girardi | Système et procédé de listes blanches internet fiables |
EP3731122B1 (fr) * | 2018-01-17 | 2021-09-01 | Mitsubishi Electric Corporation | Appareil de détection d'attaque, procédé de détection d'attaque et programme de détection d'attaque |
JP7378089B2 (ja) * | 2018-06-13 | 2023-11-13 | パナソニックIpマネジメント株式会社 | 不正通信検知装置、不正通信検知方法及び製造システム |
US11171960B2 (en) * | 2018-12-03 | 2021-11-09 | At&T Intellectual Property I, L.P. | Network security management based on collection and cataloging of network-accessible device information |
US10868681B2 (en) | 2018-12-31 | 2020-12-15 | Schweitzer Engineering Laboratories, Inc. | Network link breaker |
US11288378B2 (en) * | 2019-02-20 | 2022-03-29 | Saudi Arabian Oil Company | Embedded data protection and forensics for physically unsecure remote terminal unit (RTU) |
CN112583763B (zh) * | 2019-09-27 | 2022-09-09 | 财团法人资讯工业策进会 | 入侵侦测装置以及入侵侦测方法 |
US11841952B2 (en) * | 2020-02-26 | 2023-12-12 | Armis Security Ltd. | Techniques for detecting exploitation of manufacturing device vulnerabilities |
US11481503B2 (en) * | 2020-02-26 | 2022-10-25 | Armis Security Ltd. | Techniques for detecting exploitation of medical device vulnerabilities |
US11588856B2 (en) * | 2020-05-08 | 2023-02-21 | Rockwell Automation Technologies, Inc. | Automatic endpoint security policy assignment by zero-touch enrollment |
US11575571B2 (en) | 2020-05-08 | 2023-02-07 | Rockwell Automation Technologies, Inc. | Centralized security event generation policy |
US12003486B2 (en) | 2021-08-09 | 2024-06-04 | Cisco Technology, Inc. | Cloud-delivered firewall rules for controlling commands sent to devices based on operational tolerance limits |
CN113625674B (zh) * | 2021-08-23 | 2023-03-24 | 江苏南方通信科技有限公司 | 一种适用于大规模、复杂生产线的组态化scada系统构建方法 |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090019531A1 (en) | 2002-09-23 | 2009-01-15 | Wimetrics Corporation | System and method for wireless local area network monitoring and intrusion detection |
US20120304130A1 (en) * | 2011-05-25 | 2012-11-29 | Battelle Energy Alliance, Llc | Systems, methods, and computer-readable media for monitoring communications on a network |
US20130074186A1 (en) * | 2011-09-16 | 2013-03-21 | Mcafee, Inc. | Device-tailored whitelists |
US20130227689A1 (en) * | 2012-02-17 | 2013-08-29 | Tt Government Solutions, Inc. | Method and system for packet acquisition, analysis and intrusion detection in field area networks |
WO2014042636A1 (fr) | 2012-09-13 | 2014-03-20 | Siemens Aktiengesellschaft | Inspection d'intrusion de paquets dans un réseau de commandes industriel |
US20140283047A1 (en) * | 2013-03-13 | 2014-09-18 | General Electric Company | Intelligent cyberphysical intrusion detection and prevention systems and methods for industrial control systems |
US20150347768A1 (en) * | 2013-12-19 | 2015-12-03 | Intel Corporation | Policy-Based Trusted Inspection of Rights Managed Content |
-
2014
- 2014-09-30 US US14/501,672 patent/US9660994B2/en active Active
-
2015
- 2015-09-30 ES ES15187752T patent/ES2883948T3/es active Active
- 2015-09-30 EP EP15187752.9A patent/EP3002648B1/fr active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090019531A1 (en) | 2002-09-23 | 2009-01-15 | Wimetrics Corporation | System and method for wireless local area network monitoring and intrusion detection |
US20120304130A1 (en) * | 2011-05-25 | 2012-11-29 | Battelle Energy Alliance, Llc | Systems, methods, and computer-readable media for monitoring communications on a network |
US20130074186A1 (en) * | 2011-09-16 | 2013-03-21 | Mcafee, Inc. | Device-tailored whitelists |
US20130227689A1 (en) * | 2012-02-17 | 2013-08-29 | Tt Government Solutions, Inc. | Method and system for packet acquisition, analysis and intrusion detection in field area networks |
WO2014042636A1 (fr) | 2012-09-13 | 2014-03-20 | Siemens Aktiengesellschaft | Inspection d'intrusion de paquets dans un réseau de commandes industriel |
US20140283047A1 (en) * | 2013-03-13 | 2014-09-18 | General Electric Company | Intelligent cyberphysical intrusion detection and prevention systems and methods for industrial control systems |
US20150347768A1 (en) * | 2013-12-19 | 2015-12-03 | Intel Corporation | Policy-Based Trusted Inspection of Rights Managed Content |
Non-Patent Citations (4)
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US12099468B2 (en) | 2011-10-04 | 2024-09-24 | Ei Electronics Llc | Systems and methods for collecting, analyzing, billing, and reporting data from intelligent electronic devices |
US11816465B2 (en) | 2013-03-15 | 2023-11-14 | Ei Electronics Llc | Devices, systems and methods for tracking and upgrading firmware in intelligent electronic devices |
US11734396B2 (en) | 2014-06-17 | 2023-08-22 | El Electronics Llc | Security through layers in an intelligent electronic device |
US20180088541A1 (en) * | 2015-03-27 | 2018-03-29 | Bühler AG | Adaptive cross plant control and steering system, and corresponding method thereof |
US10649414B2 (en) * | 2015-03-27 | 2020-05-12 | Bühler AG | Adaptive cross plant control and steering system, and corresponding method thereof |
US10630701B2 (en) | 2017-11-29 | 2020-04-21 | Institute For Information Industry | System and method for identifying application layer behavior |
US11734704B2 (en) | 2018-02-17 | 2023-08-22 | Ei Electronics Llc | Devices, systems and methods for the collection of meter data in a common, globally accessible, group of servers, to provide simpler configuration, collection, viewing, and analysis of the meter data |
US11754997B2 (en) | 2018-02-17 | 2023-09-12 | Ei Electronics Llc | Devices, systems and methods for predicting future consumption values of load(s) in power distribution systems |
US20200389499A1 (en) * | 2019-06-07 | 2020-12-10 | Electro Industries/Gauge Tech | Enterprise security in meters |
US11863589B2 (en) * | 2019-06-07 | 2024-01-02 | Ei Electronics Llc | Enterprise security in meters |
Also Published As
Publication number | Publication date |
---|---|
EP3002648A2 (fr) | 2016-04-06 |
EP3002648A3 (fr) | 2016-06-29 |
US20160094578A1 (en) | 2016-03-31 |
EP3002648B1 (fr) | 2021-06-16 |
ES2883948T3 (es) | 2021-12-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9660994B2 (en) | SCADA intrusion detection systems | |
EP3834401B1 (fr) | Détection d'événement de système industriel et réponse correspondante | |
US11575703B2 (en) | Network security threat intelligence sharing | |
JP7534067B2 (ja) | プロセス制御スイッチの中毒防止 | |
JP6749106B2 (ja) | 産業用通信ネットワークにおける異常検出、異常検出システム、及び異常検出を行う方法 | |
EP3026863B1 (fr) | Pare-feu avec classificateur d'application de paquets | |
US11212322B2 (en) | Automated discovery of security policy from design data | |
US11196711B2 (en) | Firewall for encrypted traffic in a process control system | |
US20160306337A1 (en) | Detection of mis-configuration and hostile attacks in industrial control networks using active querying | |
US20180307841A1 (en) | Computer control system security | |
CN104168126B (zh) | 一种无人值守智能设备自维护管理系统及方法 | |
CN103975331A (zh) | 并入了被管理基础设施设备的安全的数据中心基础设施管理系统 | |
US10970369B2 (en) | Rapid file authentication on automation devices | |
CA3232592A1 (fr) | Procedes et systemes d'evaluation et d'amelioration de la cybersecurite d'un reseau | |
Lekidis | Cyber-attack TTP analysis for EPES systems | |
US11418447B1 (en) | Leveraging out-of-band communication channels between process automation nodes | |
US20230079418A1 (en) | On-chassis backplane intrusion detection system and continuous thread detection enablement platform |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: SCHNEIDER ELECTRIC USA INC., ILLINOIS Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:MCQUILLAN, JAYME LEE;LLOYD, CHAD ANDREW;SIGNING DATES FROM 20141014 TO 20141015;REEL/FRAME:034005/0593 |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1551); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 4 |